2025/04/30 13:26:18 Requesting https://server4:443/myeywlcpny. 2025/04/30 13:26:18 Increased receive buffer size to 14336 kiB 2025/04/30 13:26:18 Increased send buffer size to 14336 kiB 2025/04/30 13:26:18 Setting DF for IPv4 and IPv6. 2025/04/30 13:26:18 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:26:18 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:26:18 Created qlog file: /logs/qlog/fabe37101be2b4dece302f19d279ba7040.sqlog 2025/04/30 13:26:18 client Starting new connection to server4 ([::]:54060 -> 193.167.100.100:443), source connection ID (empty), destination connection ID fabe37101be2b4dece302f19d279ba7040, version v1 2025/04/30 13:26:18 Adding connection ID (empty). 2025/04/30 13:26:18 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:26:18 client -> Sending packet 0 (1280 bytes) for connection fabe37101be2b4dece302f19d279ba7040, Initial 2025/04/30 13:26:18 client Long Header{Type: Initial, DestConnectionID: fabe37101be2b4dece302f19d279ba7040, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 13:26:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 13:26:18 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1089 bytes. 2025/04/30 13:26:18 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:26:18 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5384e0d9f0f03823bcd742b8f444852e, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:26:18 client Received first packet. Switching destination connection ID to: 5384e0d9f0f03823bcd742b8f444852e 2025/04/30 13:26:18 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 12.112ms} 2025/04/30 13:26:18 client newly acked packets (1): [0] 2025/04/30 13:26:18 client updated RTT: 39.858009ms (σ: 19.929004ms) 2025/04/30 13:26:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:26:18 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:26:18 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:26:18 client Parsed a coalesced packet. Part 2: 1089 bytes. Remaining: 0 bytes. 2025/04/30 13:26:18 client <- Reading packet 0 (1089 bytes) for connection (empty), Handshake 2025/04/30 13:26:18 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5384e0d9f0f03823bcd742b8f444852e, PacketNumber: 0, PacketNumberLen: 1, Length: 1064, Version: v1} 2025/04/30 13:26:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 695, Offset + Data length: 695} 2025/04/30 13:26:18 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:26:18 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:26:18 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: fabe37101be2b4dece302f19d279ba7040, InitialSourceConnectionID: 5384e0d9f0f03823bcd742b8f444852e, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:26:18 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection fabe37101be2b4dece302f19d279ba7040 2025/04/30 13:26:18 client Long Header{Type: Initial, DestConnectionID: 5384e0d9f0f03823bcd742b8f444852e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:26:18 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:26:18 client Long Header{Type: Handshake, DestConnectionID: 5384e0d9f0f03823bcd742b8f444852e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:26:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:26:18 client Dropping Initial keys. 2025/04/30 13:26:18 client -> Sending packet 1 (51 bytes) for connection fabe37101be2b4dece302f19d279ba7040, Handshake 2025/04/30 13:26:18 client Long Header{Type: Handshake, DestConnectionID: 5384e0d9f0f03823bcd742b8f444852e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:26:18 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:26:18 client -> Sending packet 0 (54 bytes) for connection fabe37101be2b4dece302f19d279ba7040, 1-RTT (ECN: ECT(0)) 2025/04/30 13:26:18 client Short Header{DestConnectionID: 5384e0d9f0f03823bcd742b8f444852e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:26:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:26:18 client <- Reading packet 0 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 13:26:18 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:26:18 client <- &wire.PingFrame{} 2025/04/30 13:26:18 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:26:18 client <- Reading packet 1 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:26:18 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:26:18 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:26:18 client Dropping Handshake keys. 2025/04/30 13:26:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 2f9cc549889716d8e85d8ec0e6914b1f, StatelessResetToken: 0xb27ccf788f840ae2a695a598199c69eb} 2025/04/30 13:26:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: f6cb81debee833e3d75f2c5a7496ee00, StatelessResetToken: 0x0cf74ec2aae3dfbedc452db1cd07c530} 2025/04/30 13:26:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 31645fb1e02b3e1dd255f73079ad07fc, StatelessResetToken: 0x9af56bcd7b202479a1eb03c0dc272d75} 2025/04/30 13:26:18 client -> Sending packet 1 (45 bytes) for connection fabe37101be2b4dece302f19d279ba7040, 1-RTT (ECN: ECT(0)) 2025/04/30 13:26:18 client Short Header{DestConnectionID: 2f9cc549889716d8e85d8ec0e6914b1f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:26:18 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 123.993µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:26:18 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:26:18 client <- Reading packet 2 (1056 bytes) for connection (empty), 1-RTT 2025/04/30 13:26:18 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:26:18 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 928µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:26:18 client newly acked packets (1): [0] 2025/04/30 13:26:18 client updated RTT: 39.294ms (σ: 16.074ms) 2025/04/30 13:26:18 client ECN capability confirmed. 2025/04/30 13:26:18 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:26:18 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:26:18 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:26:18 client <- Reading packet 3 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:26:18 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:26:18 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:26:18 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:26:18 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:26:18 client -> Sending packet 2 (43 bytes) for connection fabe37101be2b4dece302f19d279ba7040, 1-RTT (ECN: ECT(0)) 2025/04/30 13:26:18 client Short Header{DestConnectionID: 2f9cc549889716d8e85d8ec0e6914b1f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:26:18 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 119.634µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:26:18 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:26:18 client -> Sending packet 3 (38 bytes) for connection fabe37101be2b4dece302f19d279ba7040, 1-RTT (ECN: ECT(0)) 2025/04/30 13:26:18 client Short Header{DestConnectionID: 2f9cc549889716d8e85d8ec0e6914b1f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:26:18 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:26:18 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:26:18 client Connection fabe37101be2b4dece302f19d279ba7040 closed.